Name:authentication of packets

Packets of information are authenticated. Typical examples
include the use of cryptographic checksums, routing information, redundancy
inherent in data to test the authenticity and consistency of information.

Complexity: Complexity issues are typically peripheral to the concept of
authentication of packets but the use of computational leverage is
fundamental to the effectiveness of these techniques against malicious
attackers.
fc@red.a.net